WEBVTT 00:00.000 --> 00:15.000 This is Hacker Public Radio Episode 3,841 from Monday to 24 April 2023. 00:15.000 --> 00:20.000 Today's show is entitled, The Oh No, News. 00:20.000 --> 00:25.000 It is hosted by some guy on the internet and is about 21 minutes long. 00:25.000 --> 00:28.000 It carries a clean flag. 00:28.000 --> 00:35.000 The summary is, Scotty and Bumblebee discusses US Marshall's service ransomware attack and more. 00:41.000 --> 00:44.000 Hello and welcome to another episode of Hacker Public Radio. 00:44.000 --> 00:48.000 I'm your host, some guy on the internet and I'm here with. 00:48.000 --> 00:49.000 Hi, I'm Bumblebee. 00:49.000 --> 00:52.000 Let's begin the Oh No News. 00:52.000 --> 00:53.000 Oh No! 00:53.000 --> 00:56.000 Let's start with threat analysis, your attack surface. 00:56.000 --> 01:02.000 In our first article, US Marshall's service computer systems hit by ransomware attack. 01:02.000 --> 01:04.000 Oh No! 01:04.000 --> 01:10.000 The ransomware attackers, known as Scorge, has hit a computer system at the US Marshall services. 01:10.000 --> 01:13.000 All right, B, what do you know about ransomware? 01:13.000 --> 01:15.000 Not much to be honest. 01:15.000 --> 01:19.000 If I think about it, I just think that if you hear the word ransom, 01:19.000 --> 01:28.000 you think that something is being taken and the you need to either pay or give something as leverage or something like that. 01:28.000 --> 01:30.000 That's the only thing I could think of. 01:30.000 --> 01:31.000 Is it something like that? 01:31.000 --> 01:33.000 Very, very close. 01:33.000 --> 01:35.000 That is the gist of it. 01:35.000 --> 01:41.000 ransomware is software malware that usually encrypts a victim systems. 01:41.000 --> 01:44.000 There are their servers, their data. 01:44.000 --> 01:48.000 And then the user is locked out of that data because they don't have the encryption key. 01:48.000 --> 01:52.000 The user is then given a message, you know, an ultimatum. 01:52.000 --> 01:58.000 Either pay the attacker to get the key to then decrypt their data. 01:58.000 --> 02:06.000 The federal government has put in place guidelines instructing US companies to not only report when these incidents occur, 02:06.000 --> 02:10.000 but also not to pay the ransom. 02:10.000 --> 02:14.000 Which I can understand that it just makes people do it over again. 02:14.000 --> 02:19.000 If you're good to humor that behavior, that is what's going to happen. 02:19.000 --> 02:23.000 But I can understand the feeling of wanting to go away and you just do that. 02:23.000 --> 02:24.000 So I can understand. 02:24.000 --> 02:34.000 Now, in this case, because it's the United States Marshall services, these criminal actors are attacking law enforcement in this situation. 02:34.000 --> 02:41.000 So they're not just out attacking your local businesses target Walmart and the other health care industries. 02:41.000 --> 02:47.000 They're actually attacking the people who would ultimately pursue the criminals. 02:47.000 --> 02:54.000 Out of all the things to hack into hacking into the US government, federal government is not a smart idea. 02:54.000 --> 02:56.000 I would agree 100% on that. 02:56.000 --> 03:05.000 Now, one of the ways that ransomware spreads or a victim encounters ransomware is usually through email. 03:05.000 --> 03:12.000 A victim clicks on something in an email. It looks like a legitimate form or document or whatever. 03:12.000 --> 03:18.000 But what they don't realize is that document has been infected with the malware payload. 03:18.000 --> 03:25.000 The payload is designed to quietly in the background, begin encrypping all of the user's data. 03:25.000 --> 03:30.000 Most of the time they're designed to spread, so if your computer is connected to a network, 03:30.000 --> 03:35.000 it will begin to spread to other devices on the network, so if you connected to a backup server, 03:35.000 --> 03:41.000 it will spread to that backup server and begin encrypping all of the data on the backup server as well. 03:41.000 --> 03:46.000 Not only does it deny the user's access to their data, 03:46.000 --> 03:50.000 but it also sends the data back to the attackers. 03:50.000 --> 03:55.000 Now, encrypting all of the user's data has two functions. 03:55.000 --> 04:04.000 One, it denies the user access to their own data, and two, it also prevents the users or limits the user's ability 04:04.000 --> 04:08.000 to discover how the attackers infiltrated the system. 04:08.000 --> 04:14.000 So, any tracks left behind by the attackers are now covered by the encryption. 04:14.000 --> 04:17.000 What is the reason for them to do it to see if they can do it? 04:17.000 --> 04:20.000 Obviously, they're not asking for money because that doesn't make sense, 04:20.000 --> 04:25.000 because they know if anyone knows the US government would never pay them. 04:25.000 --> 04:31.000 What information are they trying to receive or take that the US marshals have? 04:31.000 --> 04:33.000 That's my question. 04:33.000 --> 04:35.000 Very good question. 04:35.000 --> 04:38.000 Remember when I mentioned that the ransomware has two functions, 04:38.000 --> 04:42.000 one encrypts the data so that the user cannot have access to it? 04:42.000 --> 04:48.000 The second function of it is to cover their tracks while the attackers steal the data. 04:48.000 --> 04:54.000 They mentioned that federal judges, as well as other criminal fugitives. 04:54.000 --> 04:58.000 A lot of that data was being stored on the service. 04:58.000 --> 05:03.000 Also, legal processes, administrative information, 05:03.000 --> 05:09.000 and other personally identifiable information pertaining to the subjects of the United States Marshall Service 05:09.000 --> 05:16.000 investigation, as well as third party information, and US Marshall employees information with stolen. 05:16.000 --> 05:23.000 So basically, they are able to identify undercover agents, judges, decisions that are being made, 05:23.000 --> 05:29.000 and all of the underworking that are being held or administrative by the US Marshall Services. 05:29.000 --> 05:34.000 Yeah, because I was thinking the same thing, very similar things, 05:34.000 --> 05:39.000 because anyone that is employed when you do an employee, you give them your home address. 05:39.000 --> 05:42.000 It may be their direct deposits are in there. 05:42.000 --> 05:47.000 I think about that too, but I'm more of think of people safety more than them trying to steal someone's identity. 05:47.000 --> 05:52.000 Obviously, they were looking for something, but it's terrifying. 05:52.000 --> 05:57.000 They won't pay, but it doesn't say anywhere that there was even a ransom. 05:57.000 --> 06:03.000 If these people aren't asking for anything in return, that means they were fishing for information. 06:03.000 --> 06:10.000 They were fact-finding, which is in my personal opinion, even more scary than them asking for money. 06:10.000 --> 06:15.000 Exactly. They are, as you put it, fact-finding in this attack. 06:15.000 --> 06:23.000 This attack potentially revealed a lot of strategies that the US Marshall Services had up their sleeves, 06:23.000 --> 06:26.000 and it's now floating around on the internet. 06:26.000 --> 06:33.000 Some attacker is possibly bidding this information out to whomever is willing to pay for. 06:33.000 --> 06:38.000 So this kind of information has very deep consequences behind it. 06:38.000 --> 06:44.000 But it also shows the intelligence of these people. 06:44.000 --> 06:49.000 For someone like me and you to have, like you said, three backups. 06:49.000 --> 06:52.000 I mean, I have so many backups. 06:52.000 --> 06:57.000 So if someone happened to hack my computer, I'm like, alright, well, I'll just wipe my hard drive 06:57.000 --> 07:01.000 and then get my other hard drive to back everything back up. 07:01.000 --> 07:05.000 And there's no worry. I mean, it's inconvenient. 07:05.000 --> 07:10.000 Yes, but I don't sit here and I'm not going to, you know, not in a right home amount. 07:10.000 --> 07:17.000 For them to be able to hack the government, which a lot of people that are in the government 07:17.000 --> 07:24.000 are, you know, MIT graduates, and all of these very skilled individuals 07:24.000 --> 07:29.000 and for them to be able to get through that, that is very telling on who these people are. 07:29.000 --> 07:36.000 No matter how brilliant we are, if we don't keep ourselves informed and, you know, follow best practices, 07:36.000 --> 07:40.000 we'll all eventually circumdit these type of attacks. 07:40.000 --> 07:46.000 So it's not a matter of when or it's not a matter of how it's a matter of when, for us. 07:46.000 --> 07:48.000 Now next story. 07:48.000 --> 07:53.000 Major data breach for US lawmakers and staff. 07:53.000 --> 07:57.000 In this story, our US Congress suffered a major data breach. 07:57.000 --> 08:05.000 Attackers claim to have stolen information for 170,000 people over at the US Congress. 08:05.000 --> 08:08.000 That's the House of Representatives and US Senate. 08:08.000 --> 08:13.000 Some of this information included social security numbers and birthdays. 08:13.000 --> 08:16.000 So this is very, very valuable information. 08:16.000 --> 08:18.000 So be, what do you think about this attack? 08:18.000 --> 08:20.000 I think it's devastating. 08:20.000 --> 08:28.000 This criminal has all of this information from hundreds of thousands of people. 08:28.000 --> 08:33.000 What they can do with this information, whether they sell it or use it, is really terrifying. 08:33.000 --> 08:36.000 We just don't know what they're going to do with it. 08:36.000 --> 08:37.000 You're right. 08:37.000 --> 08:41.000 Now also in this attack, they mentioned a potential for fishing. 08:41.000 --> 08:48.000 So these lawmakers and their staffers are not only going to have to, one, review security protocol, 08:48.000 --> 08:58.000 but two, now they have to go and update others on the protocol, meaning other family members are so that may be experiencing attacks in the future. 08:58.000 --> 09:03.000 People don't realize that when they're looking for something, they may not be looking for one individual. 09:03.000 --> 09:07.000 They may be looking for hundreds of thousands just to have information. 09:07.000 --> 09:16.000 Their families, their, you know, they have their social security numbers on there, their emails, their birthdays, their phone numbers, their home addresses, everything. 09:16.000 --> 09:24.000 I, when I was reading one of the headlines, they talked about that they're having security for these people now because of this. 09:24.000 --> 09:27.000 These are government officials, the highest of what we have. 09:27.000 --> 09:36.000 Even if these hackers didn't have the intention to physically harm them, the information that they're selling to other people, they might have that intent. 09:36.000 --> 09:44.000 Now be, you mentioned security that they're going to be providing the lawmakers, are we talking about, you know, secret service or something here? 09:44.000 --> 09:48.000 Not at this moment, mostly it's identity protection. 09:48.000 --> 09:50.000 Oh, I got what you're saying to you. 09:50.000 --> 09:52.000 I did it in the credit protection. 09:52.000 --> 09:54.000 The monitoring services got you. 09:54.000 --> 09:55.000 Absolutely. 09:55.000 --> 10:03.000 It'd be very difficult for them to have hundreds and thousands of them having, like you said, secret service. 10:03.000 --> 10:11.000 I mean, I wouldn't be surprised that they're doing that for the regular house representative, but I'm not certain if they're doing it for staff. 10:11.000 --> 10:20.000 On our next summit, we are going to talk about the owner of breach forms was arrested for conspiracy to commit access device fraud. 10:20.000 --> 10:26.000 All right, so in this story, this breach forms was where they sell data. 10:26.000 --> 10:28.000 So be, what do you think about this? 10:28.000 --> 10:36.000 Well, it's really interesting because if you remember the last segment we were talking about the politicians and the providers in the US, 10:36.000 --> 10:43.000 House of Representatives, all of their information was stolen and well, it was stolen and sold on this site. 10:43.000 --> 10:49.000 They attempted to sell all the personal information on breach forms website. 10:49.000 --> 10:58.000 So that being said, currently he was arrested on March 15th and he received bail on the 16th. 10:58.000 --> 11:02.000 And he is supposed to be in court on the 24th. 11:02.000 --> 11:09.000 Oh, man. So we're talking about a place where attackers actually take their stolen data. 11:09.000 --> 11:14.000 Go to a bidding site to then sell that data. 11:14.000 --> 11:21.000 This bidding site was seized by the FBI and the attacker who ran it was put in jail for, 11:21.000 --> 11:24.000 What sort of cybercrime was he charged with? 11:24.000 --> 11:32.000 conspiracy to commit access device fraud right now. They're not releasing much information based on the court case. 11:32.000 --> 11:41.000 But what they are saying is that they did seize all of his information, his documents, everything that he had had on it. 11:41.000 --> 11:46.000 And right now they're trying to see who he bought it from. 11:46.000 --> 11:49.000 Oh, so they're doing a trace investigation now. 11:49.000 --> 11:56.000 Wow, I hope they end up finding out the links in this chain and bring them all down actually because this is scary. 11:56.000 --> 12:04.000 Absolutely, because at the moment they don't, they don't have much information on who stole said documents and information. 12:04.000 --> 12:06.000 But they do know where is being sold. 12:06.000 --> 12:09.000 So which is which is terrifying. 12:09.000 --> 12:14.000 All of these things could be sold and put on the black market or even have it as public view. 12:14.000 --> 12:20.000 It's easy to change a phone number and change an email. You can't change your birthday or your social. 12:20.000 --> 12:23.000 Yeah, you're right. So on our next story. 12:23.000 --> 12:26.000 You is just down that wire. 12:26.000 --> 12:33.000 It turns out it's a remote admin tool or it was disguised as a remote admin tool, but it was actually malware. 12:33.000 --> 12:40.000 Well, it's pretty obvious that they were selling it just so they can use it to hack into other people's information. 12:40.000 --> 12:44.000 Literally, you are paying to be hacked. 12:44.000 --> 12:49.000 Yeah, you're paying for your paying to be made a victim here. 12:49.000 --> 12:53.000 So this was a very insidious attack. 12:53.000 --> 12:58.000 And of all the ones we've spoken today, this one is probably the most ridiculous. 12:58.000 --> 13:01.000 You want to know something even scarier about it. 13:01.000 --> 13:06.000 That device that you have that you call an iPhone is virtually the same thing. 13:06.000 --> 13:14.000 Here's someone selling you a device telling you it's secure and you can use it to manage your daily life. 13:14.000 --> 13:23.000 Meanwhile, they're turning around and selling every single thing you do with that device to a third party that you have no knowledge of. 13:23.000 --> 13:24.000 Absolutely. 13:24.000 --> 13:31.000 Is the same thing when you see all those people they say, Oh, we will not sell or share your information. 13:31.000 --> 13:32.000 I'm always like, 13:32.000 --> 13:42.000 Are you sure, though? Are you sure, though? Yeah, they, I think the only difference between those scenarios with the iPhone and other services and this one. 13:42.000 --> 13:48.000 This particular piece of malware was offered directly to attackers. 13:48.000 --> 13:50.000 So that's the only difference here. 13:50.000 --> 14:01.000 They, they charge do money to become a victim and then sold the information to attackers who could have a much more direct path to exploding you. 14:01.000 --> 14:04.000 And the FBI sees that took it down. 14:04.000 --> 14:06.000 So hopefully this is out of the way. 14:06.000 --> 14:09.000 But I don't recall seeing any arrests being made there. 14:09.000 --> 14:13.000 So the people that are doing this are still out there with that source code. 14:13.000 --> 14:18.000 So we'll just have to look out for another administrative tool popping up on the market. 14:18.000 --> 14:21.000 Let's go ahead and move on to our next story. 14:21.000 --> 14:23.000 Hopefully this one isn't as scary. 14:23.000 --> 14:28.000 Independent living systems provider notice of data breach. 14:28.000 --> 14:31.000 All right, in this story, be helped me out here. 14:31.000 --> 14:33.000 Am I seeing what I think I'm seeing? 14:33.000 --> 14:37.000 Is this our most vulnerable citizens under attack? 14:37.000 --> 14:41.000 Unfortunately, yeah, it's so, so devastating. 14:41.000 --> 14:47.000 It's so sad because most of the elderly don't understand technology the way that we do. 14:47.000 --> 14:54.000 So they expect that when they go to a community care center or what we call it a nursing home, 14:54.000 --> 14:56.000 they want to live out their life in peace. 14:56.000 --> 14:59.000 They don't want to have to worry about this. 14:59.000 --> 15:05.000 Most of these elderly, they worry about getting a phone call and scamming them that way. 15:05.000 --> 15:08.000 That's a lot of the times where these people pry. 15:08.000 --> 15:14.000 And now they hack into this to take it from our seniors. 15:14.000 --> 15:16.000 It's just disgusting. 15:16.000 --> 15:23.000 A company by name of independent living systems has had to put out a notice that their customers 15:23.000 --> 15:27.000 elderly citizens who went there for safety and security. 15:27.000 --> 15:32.000 All bundled up together to make one prime target became under attack. 15:32.000 --> 15:36.000 And now the types of information released in this attack. 15:36.000 --> 15:42.000 I mean, it's kind of heartbreaking here, but here's how their names, their addresses, 15:42.000 --> 15:46.000 their data birth, drivers license, state identification numbers, 15:46.000 --> 15:50.000 social security numbers, financial information, 15:50.000 --> 15:55.000 Medicare and Medicaid, other medical record numbers, 15:55.000 --> 16:00.000 as well as their mental and physical treatments and condition information. 16:00.000 --> 16:03.000 Everything down to their food delivery information, 16:03.000 --> 16:07.000 their diagnosis codes and diagnosis information, 16:07.000 --> 16:10.000 the date they were admitted, the date that they were discharged, 16:10.000 --> 16:15.000 prescription information, all of this was taken from this database. 16:15.000 --> 16:19.000 This was a massive breach that left many vulnerable. 16:19.000 --> 16:22.000 Independent living system is a third party. 16:22.000 --> 16:25.000 So they are kind of like a broker, if you will. 16:25.000 --> 16:28.000 They manage a lot of these places. 16:28.000 --> 16:33.000 The place that was actually hacked was folder community care. 16:33.000 --> 16:38.000 They're the actual nursing home or living facility, 16:38.000 --> 16:41.000 is what most in the medical field call is a living facility. 16:41.000 --> 16:46.000 So on average, with insurance, 16:46.000 --> 16:51.000 you will pay, you could pay as low as 5,000, 16:51.000 --> 16:54.000 some people, but in my experience, 16:54.000 --> 16:57.000 people had to pay 20, 30, 40 grand 16:57.000 --> 17:00.000 underpinning on the facility you go to. 17:00.000 --> 17:03.000 Is this 20, 30, 40 grand a year? 17:03.000 --> 17:05.000 No, this is per month. 17:05.000 --> 17:09.000 What goes into these facilities besides your security that 17:09.000 --> 17:13.000 got broken into that we're now experiencing talking about, 17:13.000 --> 17:18.000 but there's also the care, depending on the type of patient there is 17:18.000 --> 17:20.000 or what we call resident. 17:20.000 --> 17:23.000 There could be feeding protocols. 17:23.000 --> 17:25.000 There could be bathing protocols. 17:25.000 --> 17:27.000 There could be of wide range of things, 17:27.000 --> 17:28.000 which cost different. 17:28.000 --> 17:30.000 If someone just has Alzheimer's, 17:30.000 --> 17:33.000 but they're able to walk and talk and speak for themselves, 17:33.000 --> 17:35.000 but they just have sight of confusion, 17:35.000 --> 17:37.000 then they don't charge as much. 17:37.000 --> 17:39.000 But if they're what we call a medical field, 17:39.000 --> 17:43.000 a complete, which means they mean complete assistance, 17:43.000 --> 17:46.000 that someone is 10 times more vulnerable, 17:46.000 --> 17:48.000 because they can't say, 17:48.000 --> 17:51.000 oh, I've been, you know, 17:51.000 --> 17:52.000 someone's so my identity, 17:52.000 --> 17:54.000 because 90% of the time, 17:54.000 --> 17:56.000 they can't communicate with you, 17:56.000 --> 17:57.000 which is even worse. 17:57.000 --> 17:59.000 Alright, so what you're telling me is, 17:59.000 --> 18:03.000 people pay for the ultimate living package 18:03.000 --> 18:05.000 for their golden years, 18:05.000 --> 18:08.000 and that package is expected to be secure, 18:08.000 --> 18:11.000 not only from the physical, 18:11.000 --> 18:14.000 because they're kind of gated away or kept separate, 18:14.000 --> 18:18.000 but they're also expected to be kept safe digitally as well, 18:18.000 --> 18:23.000 and this facility down in Florida was hit, 18:23.000 --> 18:25.000 and not only was the facility hit, 18:25.000 --> 18:30.000 but the third party which manages the data was also hit. 18:30.000 --> 18:33.000 Yes, what I've looked into 18:33.000 --> 18:36.000 is that this independent living system 18:36.000 --> 18:39.000 actually manages three other places. 18:39.000 --> 18:41.000 Wow, let's, let's go ahead and switch over 18:41.000 --> 18:44.000 to use your space for a little bit. 18:44.000 --> 18:45.000 In this new segment, 18:45.000 --> 18:48.000 we're going to talk about how PayPal is issuing 18:48.000 --> 18:53.000 a $2,500 fee for misinformation on social media. 18:53.000 --> 18:57.000 Whoa, PayPal introducing a $2,500 fee. 18:57.000 --> 19:00.000 Apparently, I can understand 19:00.000 --> 19:02.000 for certain points of views, 19:02.000 --> 19:04.000 that maybe they're trying to fight hate speech, 19:04.000 --> 19:06.000 but it seems a little excessive to me. 19:06.000 --> 19:07.000 What do you think? 19:07.000 --> 19:10.000 Yeah, I'd say it's not just excessive. 19:10.000 --> 19:12.000 It is absolutely crazy. 19:12.000 --> 19:14.000 From what I could see here, 19:14.000 --> 19:18.000 they're imposing a fine on their customers 19:18.000 --> 19:21.000 of $2,500 for, quote, 19:21.000 --> 19:24.000 misinformation, close quote, 19:24.000 --> 19:27.000 and they're the judges behind 19:27.000 --> 19:30.000 what is considered misinformation. 19:30.000 --> 19:34.000 So, if you want to challenge it, just know 19:34.000 --> 19:36.000 they're the judge and jury. 19:36.000 --> 19:38.000 Now, from what I could tell PayPal has 19:38.000 --> 19:40.000 reversed on this effort, 19:40.000 --> 19:42.000 but how long? 19:42.000 --> 19:44.000 The, I want to ask you a question. 19:44.000 --> 19:46.000 I introduced you to HPR, 19:46.000 --> 19:48.000 and I sent you a link 19:48.000 --> 19:50.000 so that way you can kind of see what 19:50.000 --> 19:52.000 the community has for a website 19:52.000 --> 19:55.000 and some of our content on the site. 19:55.000 --> 19:56.000 Let me know, 19:56.000 --> 19:58.000 what do you think about HPR? 19:58.000 --> 20:01.000 I had a little bit of a hard time navigating a little bit. 20:01.000 --> 20:03.000 I don't know if it's because it was my first time 20:03.000 --> 20:06.000 when I hit the page or the link that you gave me. 20:06.000 --> 20:08.000 I didn't realize, 20:08.000 --> 20:10.000 I had to go all the way down 20:10.000 --> 20:12.000 to listen to said recording. 20:12.000 --> 20:14.000 I didn't know where I guess the recording 20:14.000 --> 20:16.000 would be or the podcast 20:16.000 --> 20:18.000 or radio aspect would be. 20:18.000 --> 20:19.000 So, for the whole time, 20:19.000 --> 20:21.000 I was like clicking things. 20:21.000 --> 20:22.000 I didn't know. 20:22.000 --> 20:24.000 I was clicking the icons. 20:24.000 --> 20:27.000 I was clicking the old-know news image. 20:27.000 --> 20:28.000 I mean, 20:28.000 --> 20:29.000 because there's a lot of things 20:29.000 --> 20:30.000 that you can click on. 20:30.000 --> 20:33.000 Because you put links in the description, 20:33.000 --> 20:35.000 you do all of those, 20:35.000 --> 20:36.000 which are great, 20:36.000 --> 20:39.000 but I had no idea where to find it. 20:39.000 --> 20:42.000 That was my one issue with it. 20:42.000 --> 20:43.000 Obviously, when I did find it, 20:43.000 --> 20:45.000 now I know that it's at the end. 20:45.000 --> 20:47.000 I'm just used to most of them being 20:47.000 --> 20:49.000 the first thing you see here, 20:49.000 --> 20:50.000 listen here, 20:50.000 --> 20:51.000 and the listen now button, 20:51.000 --> 20:52.000 and is at the bottom. 20:52.000 --> 20:54.000 I don't know if that's purposeful, 20:54.000 --> 20:56.000 but the one thing I really did like 20:56.000 --> 20:59.000 is how organized it is. 20:59.000 --> 21:01.000 For the most part, 21:01.000 --> 21:02.000 it is pretty organized. 21:02.000 --> 21:03.000 It's bright. 21:03.000 --> 21:05.000 I'm all about day mode. 21:05.000 --> 21:06.000 I like that about it. 21:06.000 --> 21:09.000 For user-friendly purposes, 21:09.000 --> 21:11.000 as long as you click through a little bit, 21:11.000 --> 21:13.000 it's pretty easy to follow. 21:13.000 --> 21:14.000 All right. 21:14.000 --> 21:15.000 So, that's some good information 21:15.000 --> 21:18.000 for the site administrators 21:18.000 --> 21:20.000 who looking for feedback 21:20.000 --> 21:22.000 for future changes to the show. 21:22.000 --> 21:23.000 I mean, 21:23.000 --> 21:24.000 to the site. 21:24.000 --> 21:26.000 I thank you for that information, 21:26.000 --> 21:29.000 and this concludes another episode 21:29.000 --> 21:31.000 of the Ono News. 21:31.000 --> 21:32.000 The, 21:32.000 --> 21:33.000 I want to thank you for coming by 21:33.000 --> 21:35.000 and participating in this with me. 21:35.000 --> 21:36.000 Yeah, 21:36.000 --> 21:37.000 I had a good time, 21:37.000 --> 21:38.000 and I'm really happy 21:38.000 --> 21:39.000 that we learned all this information, 21:39.000 --> 21:41.000 and that we can be resilient 21:41.000 --> 21:43.000 and project ourselves. 21:43.000 --> 21:44.000 All right. 21:44.000 --> 21:45.000 Thank you all for listening, 21:45.000 --> 21:46.000 and we'll see you in the next episode 21:46.000 --> 21:48.000 of the Ono News. 21:48.000 --> 21:49.000 Ono! 21:49.000 --> 21:54.000 You have been listening to Hacker Public Radio 21:54.000 --> 21:56.000 at Hacker Public Radio.org. 21:56.000 --> 21:58.000 Today's show was contributed 21:58.000 --> 22:00.000 by a HBR this night by itself, 22:00.000 --> 22:03.000 if you ever thought of recording podcast, 22:03.000 --> 22:05.000 and click on our contribution 22:05.000 --> 22:08.000 to find out how easy it means. 22:08.000 --> 22:11.000 Hosting for HBR has been kindly provided by 22:11.000 --> 22:13.000 an onsthost.com, 22:13.000 --> 22:15.000 the Internet Archive, 22:15.000 --> 22:17.000 and our Sync.net. 22:17.000 --> 22:19.000 On this otherwise stages, 22:19.000 --> 22:21.000 today's show is released under 22:21.000 --> 22:22.000 a Creative Commons, 22:22.000 --> 22:23.000 attribution 22:23.000 --> 22:47.000 for going to international license.